SlideShare a Scribd company logo
1 of 12
Download to read offline
Trade Secrets and
Information Security
By
Dr. Kalyan C. Kankanala
kalyan@bananaip.com
www.bananaip.com
Writings: www.kalyankankanala.com
Copyright BananaIP Counsels 2017 - All Rights Reserved
Trade Secret
Copyright BananaIP Counsels 2017 - All Rights Reserved
Any Information
• Independent Economic/Business Value
• Not Known to others
• Reasonable Measures to protect Secrecy
Reasonable Measures
Copyright BananaIP Counsels 2017 - All Rights Reserved
• Notice of Secret Information
• Steps to safeguard the information
• Steps are legally recognized
• NDAs and Confidentiality Clauses
• Access Controls
• User Name Passwords
• Confidentiality Notices
Copyright BananaIP Counsels 2017 - All Rights Reserved
Reasonable?
Copyright BananaIP Counsels 2017 - All Rights Reserved
Misappropriation
Improper Means
•Civil
•Criminal
•Tortuous
Copyright BananaIP Counsels 2017 - All Rights Reserved
Defenses
•Independent Creation
•Reverse Engineering
•Inevitable Disclosure
Copyright BananaIP Counsels 2017 - All Rights Reserved
Example
SoftS specializes in software for tracking people, and their
activities. Unhappy with his appraisal, Virappa, one of the key
employees of SoftS joins IPM, SoftS' competitor. Within three
months of Virappa's joining, IPM launches a mobile application
to monitor and track mood of a person based on voice data.
The mobile application has many features that form part of
SoftS' upcoming mobile application for analyzing voice
messages.
SoftS sues Virappa and IPM for trade secret misappropriation.
Copyright BananaIP Counsels 2017 - All Rights Reserved
Facts
Virappa signed an employment agreement, which has a
confidentiality clause that survives termination of his employment with
SoftS.
Virappa was working in the voice data analytics software applications
department of SoftS.
Virappa's linkedin profile and facebook profile specifically describe his
work in the voice data department, and IPM's HR team contacted him
on Linkedin based on the said description.
Virappa copied all data on his office laptop onto a hard disk for back
up purposes as his laptop was crashing regularly.
Virappa had a nasty fight with his reporting manager after his
appraisal.
Misappropriation?
Copyright BananaIP Counsels 2017 - All Rights Reserved
Social Media and Information
Security
•LinkedIn Connections
•Facebook and Twitter Strategy
•WhatsApp group communications
•Blogging
Copyright BananaIP Counsels 2017 - All Rights Reserved
Some Recent Cases
•ZeniMax v. Oculus - Virtual Reality - 500 Million
•Dalmatia v. FoodMatch - Fig Jam - 2.5 Million
•Waymo v. Uber - Self Driving Car Technology - Pending
•Goldman Sachs v. Sergey Aleynikov - Trading Software -
Convicted - 8 Years
•Doe v. Google - StopLeak - Broad Confidentiality Agreements
Dr. Kalyan’s Books And Novels
Copyright BananaIP Counsels 2017 - All Rights Reserved
Visit
Dr. Kalyan’s
Book page
Pay What you
want to Buy!
Email Address : kalyan@bananaip.com
Professional Profile : www.bananaip.com/dr-kalyan-c-kankanala
Authors Profile : www.kalyankankanala.com
Academic Profile : www.ipprof.com
Wiki Page :
https://en.wikipedia.org/wiki/Kalyan_Chakravarthy_Kankanala
How to Reach Dr. Kalyan C. Kankanala
Copyright BananaIP Counsels 2017 - All Rights Reserved

More Related Content

What's hot

What's hot (9)

Building better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementBuilding better security for your API platform using Azure API Management
Building better security for your API platform using Azure API Management
 
Seed investdeck
Seed investdeckSeed investdeck
Seed investdeck
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
 
Web hacking using Cyber range
Web hacking using Cyber rangeWeb hacking using Cyber range
Web hacking using Cyber range
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial Services
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
20181110 sps leicester connect protecting your data in office 365
20181110 sps leicester connect protecting your data in office 36520181110 sps leicester connect protecting your data in office 365
20181110 sps leicester connect protecting your data in office 365
 

Similar to Dr. Kalyan Kankanala was the key note speaker at Cisco on April 6, 2017

BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"
ChristiAKannapel
 

Similar to Dr. Kalyan Kankanala was the key note speaker at Cisco on April 6, 2017 (20)

Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceGeek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 
Real-World Data Governance: Governance Risk and Compliance
Real-World Data Governance: Governance Risk and ComplianceReal-World Data Governance: Governance Risk and Compliance
Real-World Data Governance: Governance Risk and Compliance
 
Getting Started with Data Governance? Use Process Models!
Getting Started with Data Governance? Use Process Models!Getting Started with Data Governance? Use Process Models!
Getting Started with Data Governance? Use Process Models!
 
Everybody is a Data Steward – Get Over It!
Everybody is a Data Steward – Get Over It!Everybody is a Data Steward – Get Over It!
Everybody is a Data Steward – Get Over It!
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
 
When to Move Your Practice to the Cloud
When to Move Your Practice to the CloudWhen to Move Your Practice to the Cloud
When to Move Your Practice to the Cloud
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
 
Real-World Data Governance: Navigating the Ocean of Data Governance Tools
Real-World Data Governance: Navigating the Ocean of Data Governance ToolsReal-World Data Governance: Navigating the Ocean of Data Governance Tools
Real-World Data Governance: Navigating the Ocean of Data Governance Tools
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
RWDG Slides: Data Governance versus Information Governance
RWDG Slides: Data Governance versus Information GovernanceRWDG Slides: Data Governance versus Information Governance
RWDG Slides: Data Governance versus Information Governance
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
 
Successful Data Governance Models and Frameworks
Successful Data Governance Models and FrameworksSuccessful Data Governance Models and Frameworks
Successful Data Governance Models and Frameworks
 
Using Data Governance to Protect Sensitive Data
Using Data Governance to Protect Sensitive DataUsing Data Governance to Protect Sensitive Data
Using Data Governance to Protect Sensitive Data
 
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
 
BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"
 
Fixing Intranet Search
Fixing Intranet SearchFixing Intranet Search
Fixing Intranet Search
 
RWDG Slides: Build an Effective Data Governance Framework
RWDG Slides: Build an Effective Data Governance FrameworkRWDG Slides: Build an Effective Data Governance Framework
RWDG Slides: Build an Effective Data Governance Framework
 
RWDG Webinar: Align Data Modeling with Data Governance
RWDG Webinar: Align Data Modeling with Data GovernanceRWDG Webinar: Align Data Modeling with Data Governance
RWDG Webinar: Align Data Modeling with Data Governance
 

Recently uploaded

一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
mefyqyn
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
mefyqyn
 
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
mefyqyn
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
mefyqyn
 
Termination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptxTermination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptx
BrV
 

Recently uploaded (20)

Petitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docxPetitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docx
 
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
 
How Can an Attorney Help With My Car Accident Claim?
How Can an Attorney Help With My Car Accident Claim?How Can an Attorney Help With My Car Accident Claim?
How Can an Attorney Help With My Car Accident Claim?
 
File Taxes Online Simple Steps for Efficient Filing.pdf
File Taxes Online Simple Steps for Efficient Filing.pdfFile Taxes Online Simple Steps for Efficient Filing.pdf
File Taxes Online Simple Steps for Efficient Filing.pdf
 
Embed-6 (1).pdfc p;p;kdk[odk[drskpokpopo
Embed-6 (1).pdfc p;p;kdk[odk[drskpokpopoEmbed-6 (1).pdfc p;p;kdk[odk[drskpokpopo
Embed-6 (1).pdfc p;p;kdk[odk[drskpokpopo
 
Embed-3-2.pdfkp[k[odk[odk[d[ok[d[pkdkdkl
Embed-3-2.pdfkp[k[odk[odk[d[ok[d[pkdkdklEmbed-3-2.pdfkp[k[odk[odk[d[ok[d[pkdkdkl
Embed-3-2.pdfkp[k[odk[odk[d[ok[d[pkdkdkl
 
2024 Managing Labor + Employee Relations Seminar
2024 Managing Labor + Employee Relations Seminar2024 Managing Labor + Employee Relations Seminar
2024 Managing Labor + Employee Relations Seminar
 
Respondent Moot Memorial including Charges and Argument Advanced.docx
Respondent Moot Memorial including Charges and Argument Advanced.docxRespondent Moot Memorial including Charges and Argument Advanced.docx
Respondent Moot Memorial including Charges and Argument Advanced.docx
 
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
 
Does Apple Neurotechnology Patents Go To Far?
Does Apple  Neurotechnology Patents Go To Far?Does Apple  Neurotechnology Patents Go To Far?
Does Apple Neurotechnology Patents Go To Far?
 
Essential Components of an Effective HIPAA Safeguard Program
Essential Components of an Effective HIPAA Safeguard ProgramEssential Components of an Effective HIPAA Safeguard Program
Essential Components of an Effective HIPAA Safeguard Program
 
Embed-1-1.pdfohediooieoiehohoiefoloeohefoi
Embed-1-1.pdfohediooieoiehohoiefoloeohefoiEmbed-1-1.pdfohediooieoiehohoiefoloeohefoi
Embed-1-1.pdfohediooieoiehohoiefoloeohefoi
 
TTD - PPT on social stock exchange.pptx Presentation
TTD - PPT on social stock exchange.pptx PresentationTTD - PPT on social stock exchange.pptx Presentation
TTD - PPT on social stock exchange.pptx Presentation
 
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
 
Asif_Sultan_Syeda_vs_UT_of_J_K.pdf op[ke[k
Asif_Sultan_Syeda_vs_UT_of_J_K.pdf op[ke[kAsif_Sultan_Syeda_vs_UT_of_J_K.pdf op[ke[k
Asif_Sultan_Syeda_vs_UT_of_J_K.pdf op[ke[k
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
 
IRDA role in Insurance sector in India .pptx
IRDA role in Insurance sector in India .pptxIRDA role in Insurance sector in India .pptx
IRDA role in Insurance sector in India .pptx
 
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
 
Termination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptxTermination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptx
 

Dr. Kalyan Kankanala was the key note speaker at Cisco on April 6, 2017

  • 1. Trade Secrets and Information Security By Dr. Kalyan C. Kankanala kalyan@bananaip.com www.bananaip.com Writings: www.kalyankankanala.com Copyright BananaIP Counsels 2017 - All Rights Reserved
  • 2. Trade Secret Copyright BananaIP Counsels 2017 - All Rights Reserved Any Information • Independent Economic/Business Value • Not Known to others • Reasonable Measures to protect Secrecy
  • 3. Reasonable Measures Copyright BananaIP Counsels 2017 - All Rights Reserved • Notice of Secret Information • Steps to safeguard the information • Steps are legally recognized • NDAs and Confidentiality Clauses • Access Controls • User Name Passwords • Confidentiality Notices
  • 4. Copyright BananaIP Counsels 2017 - All Rights Reserved Reasonable?
  • 5. Copyright BananaIP Counsels 2017 - All Rights Reserved Misappropriation Improper Means •Civil •Criminal •Tortuous
  • 6. Copyright BananaIP Counsels 2017 - All Rights Reserved Defenses •Independent Creation •Reverse Engineering •Inevitable Disclosure
  • 7. Copyright BananaIP Counsels 2017 - All Rights Reserved Example SoftS specializes in software for tracking people, and their activities. Unhappy with his appraisal, Virappa, one of the key employees of SoftS joins IPM, SoftS' competitor. Within three months of Virappa's joining, IPM launches a mobile application to monitor and track mood of a person based on voice data. The mobile application has many features that form part of SoftS' upcoming mobile application for analyzing voice messages. SoftS sues Virappa and IPM for trade secret misappropriation.
  • 8. Copyright BananaIP Counsels 2017 - All Rights Reserved Facts Virappa signed an employment agreement, which has a confidentiality clause that survives termination of his employment with SoftS. Virappa was working in the voice data analytics software applications department of SoftS. Virappa's linkedin profile and facebook profile specifically describe his work in the voice data department, and IPM's HR team contacted him on Linkedin based on the said description. Virappa copied all data on his office laptop onto a hard disk for back up purposes as his laptop was crashing regularly. Virappa had a nasty fight with his reporting manager after his appraisal. Misappropriation?
  • 9. Copyright BananaIP Counsels 2017 - All Rights Reserved Social Media and Information Security •LinkedIn Connections •Facebook and Twitter Strategy •WhatsApp group communications •Blogging
  • 10. Copyright BananaIP Counsels 2017 - All Rights Reserved Some Recent Cases •ZeniMax v. Oculus - Virtual Reality - 500 Million •Dalmatia v. FoodMatch - Fig Jam - 2.5 Million •Waymo v. Uber - Self Driving Car Technology - Pending •Goldman Sachs v. Sergey Aleynikov - Trading Software - Convicted - 8 Years •Doe v. Google - StopLeak - Broad Confidentiality Agreements
  • 11. Dr. Kalyan’s Books And Novels Copyright BananaIP Counsels 2017 - All Rights Reserved Visit Dr. Kalyan’s Book page Pay What you want to Buy!
  • 12. Email Address : kalyan@bananaip.com Professional Profile : www.bananaip.com/dr-kalyan-c-kankanala Authors Profile : www.kalyankankanala.com Academic Profile : www.ipprof.com Wiki Page : https://en.wikipedia.org/wiki/Kalyan_Chakravarthy_Kankanala How to Reach Dr. Kalyan C. Kankanala Copyright BananaIP Counsels 2017 - All Rights Reserved